old-www/LDP/solrhe/Securing-Optimizing-Linux-R.../soft-secmonitor.html

189 lines
2.9 KiB
HTML

<HTML
><HEAD
><TITLE
>Software -Security/Monitoring</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.60"><LINK
REL="HOME"
TITLE="Securing and Optimizing Linux"
HREF="index.html"><LINK
REL="UP"
TITLE="Software -Security"
HREF="soft-secure.html"><LINK
REL="PREVIOUS"
TITLE="Build, Install software on your system"
HREF="chap13sec111.html"><LINK
REL="NEXT"
TITLE="sXid"
HREF="chap14sec112.html"></HEAD
><BODY
CLASS="chapter"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="NAVHEADER"
><TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>Securing and Optimizing Linux: RedHat Edition -A Hands on Guide</TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="chap13sec111.html"
>Prev</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
></TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="chap14sec112.html"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="chapter"
><H1
><A
NAME="prt5ch2ssmt"
>Chapter 14. Software -Security/Monitoring</A
></H1
><DIV
CLASS="TOC"
><DL
><DT
><B
>Table of Contents</B
></DT
><DT
>14.1. <A
HREF="chap14sec112.html"
>sXid</A
></DT
><DT
>14.2. <A
HREF="chap14sec113.html"
>Configure and Optimize sXid</A
></DT
><DT
>14.3. <A
HREF="chap14sec114.html"
>Logcheck</A
></DT
><DT
>14.4. <A
HREF="chap14sec115.html"
>Configure and Optimize Logcheck</A
></DT
><DT
>14.5. <A
HREF="chap14sec116.html"
>PortSentry</A
></DT
><DT
>14.6. <A
HREF="chap14sec117.html"
>Configure and Optimise Portsentry</A
></DT
><DT
>14.7. <A
HREF="chap14sec118.html"
>Test fire your PortSentry</A
></DT
></DL
></DIV
><DIV
CLASS="highlights"
><A
NAME="AEN7332"
></A
><P
>&#13; At this part of our book, all software-listed on chapter 14 through chapter 32 are optional and depends on what you want to install or do on your server. e.g., What kind of tasks will your server do, and for
which part of your network Intranet/Internet? In other parts it may be important for you to replace the Telnet program with SSH for secure remote administration. Another interesting program is Tripwire that
aids system administrators and users in monitoring a designated set of files for any changes.
</P
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="chap13sec111.html"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="chap14sec112.html"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>Build, Install software on your system</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="soft-secure.html"
>Up</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>sXid</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>